Browse Results

Showing 55,776 through 55,800 of 60,888 results

Taming the Infinities of Concurrency: Essays Dedicated to Javier Esparza on the Occasion of His 60th Birthday (Lecture Notes in Computer Science #14660)

by Stefan Kiefer Jan Křetínský Antonín Kučera

Javier Esparza received his primary degree in Theoretical Physics and in 1990 his PhD in Computer Science from the University of Zaragoza. After positions at the University of Hildesheim, the University of Edinburgh, and the Technical University of Munich, he then held professorships at the University of Edinburgh and the University of Stuttgart, and finally returned to TU Munich where he currently holds the Chair of Foundations of Software Reliability and Theoretical Computer Science. Javier is a leading researcher in concurrency theory, distributed and probabilistic systems, Petri nets, analysis of infinite-state models, and more generally formal methods for the verification of computer systems. He has coauthored over 200 publications, many of them highly influential. He coauthored the monographs Free Choice Petri Nets, and Unfoldings: A Partial Order Approach to Model Checking, and more recently the textbook Automata Theory: An Algorithmic Approach. The latter is an exampleof Javier’s many activities as a teacher, he has supervised more than 20 PhD students, taught at more than 20 summer schools, and won many awards for his university teaching. He is regularly invited to deliver plenary talks at prestigious computer science conferences and participate in senior program committees, he has contributed as a senior member of technical working groups, society councils, and journal editorial boards, and in 2021 he became a founding Editor-in-Chief of the open-access TheoretiCS journal. This Festschrift celebrates Javier’s contributions on the occasion of his 60th birthday, the contributions reflect the breadth and depth of his successes in Petri nets, concurrency in general, distributed and probabilistic systems, games, formal languages, logic, program analysis, verification, and synthesis.

Taming the Machine: Ethically Harness the Power of AI

by Nell Watson

AI promises to transform our world, supercharging productivity and driving new innovations. Taming the Machine uncovers how you can responsibly harness the power of AI with confidence.AI has the potential to become a personal assistant, a creative partner, an editor and a research tool all at once. But it also represents a threat to your livelihood, data and privacy. Taming the Machine offers the practical insights and knowledge you need to work with AI with an ethical and responsible approach.In this book, celebrated AI expert and ethicist Nell Watson offers practical insights on how you can ethically innovate with AI. It delves into the ethical issues of unbridled AI, highlighting the challenges that it will bring to society and business unless we fortify cybersecurity, safeguard our data, and understand the dangerous potential of artificial intelligence.Step into the future and supercharge your performance safely by Taming the Machine.

Taming Your Dragon: Addressing Your Technical Debt

by Dr. Andrew Brown

Technical debt is an often-overlooked problem that the software industry needs to take more seriously. All organizations are impacted by it, most wish that they had less of it, but need help in understanding the nature of the beast. This book aims to clear up any misconceptions and show you how to implement a sound technical debt management program to suit your company’s needs. You’ll learn the greatest challenge in solving the technical debt dilemma is not to find solutions to it, but rather to find solutions to the human and organizational issues that lead to that debt. For example, convincing senior stakeholders of the importance of addressing technical debt, getting stakeholders to acknowledge how their actions lead to unintentional debt, and enabling teams to prioritize technical debt over short-term goals. Therefore, this book is divided into three parts: defining technical debt, understanding technical debt, and tackling technical debt. It begins by explaining why technical debt should not be considered a technical problem, but rather a problem of how trade-off decisions are made. You’ll then examine how making decisions using the affect heuristic, more commonly known as a “gut feeling,” can lead to unnecessary technical debt, followed by some techniques for combating your vulnerability to this trap. Reducing your organization’s level of technical debt is not easy. Taming Your Dragon will show you how to implement a technical debt management program. What You Will Learn Review a new paradigm based on technical debt being a combination of trade-off problems and system problems Understand the many ways that technical debt adversely affects an organization’s ability to deliver IT change Create an effective process for addressing technical debt See why analogies are important Who This Book Is For Software teams supporting DevOps, managers, and other business stakeholders looking to implement a technical debt management program.

Tangible Interactive Systems

by Guy André Boy

Distinguishingbetween tangible user interfaces (TUI) and tangible interactive systems (TISs),this book takes into account not only the user interfaces but also looks at howinteraction can be enabled by using digital information through the physicalenvironment. TISs go far beyond the concept of tangible user interfaces,addressing large complex systems in the framework of human-centred design andputting the human at the center of the design process from the start. Howcan human-centered designers grasp the real world with computers? This questionis explored by looking at concepts such as innovation, complexity, flexibility,maturity, stability, sustainability and art to see whether we can assess bothphysical and figurative tangibility during the design process before productdelivery. Concepts like creativity, design thinking and team spirit arefundamental to TIS's human-centered design, and are presented together withhuman-systems integration (HSI), agile development and formative evaluations tobuild a greater understanding of this new area of research. TangibleInteractive Systems wouldbe an essential read to designers, academics and other professionals concernedwith product design within HCI, industrial design, virtual engineering andother related areas.

Tangible Modeling with Open Source GIS

by Helena Mitasova Vaclav Petras Brendan Harmon Anna Petrasova

This book presents a new type of modeling environment where users interact with geospatial simulations using 3D physical models of studied landscapes. Multiple users can alter the physical model by hand during scanning, thereby providing input for simulation of geophysical processes in this setting. The authors have developed innovative techniques and software that couple this hardware with open source GRASS GIS, making the system instantly applicable to a wide range of modeling and design problems. Since no other literature on this topic is available, this Book fills a gap for this new technology that continues to grow. Tangible Modeling with Open Source GIS will appeal to advanced-level students studying geospatial science, computer science and earth science such as landscape architecture and natural resources. It will also benefit researchers and professionals working in geospatial modeling applications, computer graphics, hazard risk management, hydrology, solar energy, coastal and fluvial flooding, fire spread, landscape, park design and computer games.

Tangible Modeling with Open Source GIS

by Helena Mitasova Payam Tabrizian Vaclav Petras Brendan Harmon Anna Petrasova

This book provides an overview of the latest developments in the fast growing field of tangible user interfaces. It presents a new type of modeling environment where the users interact with geospatial data and simulations using 3D physical landscape model coupled with 3D rendering engine. Multiple users can modify the physical model, while it is being scanned, providing input for geospatial analysis and simulations. The results are then visualized by projecting images or animations back on the physical model while photorealistic renderings of human views are displayed on a computer screen or in a virtual reality headset. New techniques and software which couple the hardware set-up with open source GRASS GIS and Blender rendering engine, make the system instantly applicable to a wide range of applications in geoscience education, landscape design, computer games, stakeholder engagement, and many others. This second edition introduces a new more powerful version of the tangible modeling environment with multiple types of interaction, including polymeric sand molding, placement of markers, and delineation of areas using colored felt patches. Chapters on coupling tangible interaction with 3D rendering engine and immersive virtual environment, and a case study integrating the tools presented throughout this book, demonstrate the second generation of the system - Immersive Tangible Landscape - that enhances the modeling and design process through interactive rendering of modeled landscape. This book explains main components of Immersive Tangible Landscape System, and provides the basic workflows for running the applications. The fundamentals of the system are followed by series of example applications in geomorphometry, hydrology, coastal and fluvial flooding, fire spread, landscape and park design, solar energy, trail planning, and others. Graduate and undergraduate students and educators in geospatial science, earth science, landscape architecture, computer graphics and games, natural resources and many others disciplines, will find this book useful as a reference or secondary textbook. Researchers who want to build and further develop the system will most likely be the core audience, but also anybody interested in geospatial modeling applications (hazard risk management, hydrology, solar energy, coastal and fluvial flooding, fire spread, landscape and park design) will want to purchase this book.

The Tangled Web: A Guide to Securing Modern Web Applications

by Michal Zalewski

Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world’s top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they’re fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security.You’ll learn how to:–Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization–Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing–Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs–Build mashups and embed gadgets without getting stung by the tricky frame navigation policy–Embed or host user-supplied content without running into the trap of content sniffingFor quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you’re most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.

The Tangled Web We Weave: Inside The Shadow System That Shapes the Internet

by James Ball

We all see what the internet does and increasingly don't like it, but do we know how and more importantly who makes it work that way? That's where the real power lays... <P><P>The internet was supposed to be a thing of revolutions. As that dream curdles, there is no shortage of villains to blame--from tech giants to Russian bot farms. But what if the problem is not an issue of bad actors ruining a good thing? What if the hazards of the internet are built into the system itself? <P><P>That's what journalist James Ball argues as he takes us to the root of the problem, from the very establishment of the internet's earliest protocols to the cables that wire it together. He shows us how the seemingly abstract and pervasive phenomenon is built on a very real set of materials and rules that are owned, financed, designed and regulated by very real people. <P><P>In this urgent and necessary book, Ball reveals that the internet is not a neutral force but a massive infrastructure that reflects the society that created it. And making it work for--and not against--us must be an endeavor of the people as well.

Tank War

by Warlord Games

Tank War, the new supplement for Bolt Action, gives players the option to expand their games to a whole new level - armored warfare. Recreate such great engagements as the battle of Kursk with the scenarios, army options and special rules found in this book. Whether you want to add more armour to your existing armies or build an entirely armoured force, Tank War has you covered.

The Tao of Alibaba: Inside the Chinese Digital Giant That Is Changing the World

by Brian A Wong

From a long-time Alibaba executive and former special assistant to Jack Ma, this is the first book to articulate how Alibaba's unique culture and &“tai chi&” management principles are providing a business and economic development model for the rest of the world. If you took the economic might of Amazon, and added the penetration of Facebook, the ubiquity of Google, and the cultural significance of YouTube, you might have something starting to resemble Alibaba. Commonly mischaracterized as a kind of Chinese eBay for businesses, Alibaba and its interlinked network of products and services have exploded into global markets, disrupting conventional businesses and creating previously unimaginable opportunities for millions of small businesses worldwide. This book reveals the Tao of Alibaba—the company&’s &“secret sauce&”—a consciously cultivated ethos and spirit that has enabled Alibaba to weather tough times and setbacks, and persist toward a common mission. It is a blueprint of the company&’s management philosophy, crystalized into the most important elements that have driven its success, and it provides a road map for how to incorporate these principles into any organization&’s operations. Wong distills his nearly two decades of experience inside the company to show readers how to align their organization&’s capabilities with performance-maximizing tools in order to achieve success. But most importantly, the Tao of Alibaba teaches the pursuit of greater purpose and meaning, steering entrepreneurs to view their ventures as a vehicle for having profound and lasting impacts on their communities. Ultimately, the lessons shared in The Tao of Alibaba will serve as timeless tools for any entrepreneur seeking to configure their organization toward purpose and impact.

The Tao of Computing (Chapman & Hall/CRC Textbooks in Computing)

by Henry M. Walker

Describing both the practical details of interest to students and the high-level concepts and abstractions highlighted by faculty, The Tao of Computing, Second Edition presents a comprehensive introduction to computers and computer technology. This edition updates its popular predecessor with new research exercises and expanded discussion questions

The Tao of Microservices

by Richard Rodger

SummaryThe Tao of Microservices guides you on the path to understanding how to apply microservice architectures to your own real-world projects. This high-level book offers a conceptual view of microservice design, along with core concepts and their application.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyAn application, even a complex one, can be designed as a system of independent components, each of which handles a single responsibility. Individual microservices are easy for small teams without extensive knowledge of the entire system design to build and maintain. Microservice applications rely on modern patterns like asynchronous, message-based communication, and they can be optimized to work well in cloud and container-centric environments.About the BookThe Tao of Microservices guides you on the path to understanding and building microservices. Based on the invaluable experience of microservices guru Richard Rodger, this book exposes the thinking behind microservice designs. You'll master individual concepts like asynchronous messaging, service APIs, and encapsulation as you learn to apply microservices architecture to real-world projects. Along the way, you'll dig deep into detailed case studies with source code and documentation and explore best practices for team development, planning for change, and tool choice.What's InsidePrinciples of the microservice architectureBreaking down real-world case studiesImplementing large-scale systemsWhen not to use microservicesAbout the Reader This book is for developers and architects. Examples use JavaScript and Node.js.About the AuthorRichard Rodger, CEO of voxgig, a social network for the events industry, has many years of experience building microservice-based systems for major global companies.Table of ContentsPART 1 - BUILDING MICROSERVICES Brave new world Services Messages Data DeploymentPART 2 - RUNNING MICROSERVICES Measurement Migration People Case study: Nodezoo.com

Tap, Move, Shake: Turning Your Game Ideas into iPhone & iPad Apps

by Todd Moore

Got a great game idea? This complete do-it-yourself guide shows you how to make your game idea a reality for the iPhone and iPad. By developing a real game hands-on through the course of this book, you'll get a thorough introduction to Xcode and Objective-C, while learning how to implement game logic, sophisticated graphics, game physics, sounds, and computer AI. Author Todd Moore taught himself how to create an iPhone game in a week, with no previous knowledge of Apple's development tools. Now he develops smartphone games and apps full time. With this book, any coder can turn game ideas into real products, ready for the App Store. Get started by writing a simple game in only 20 lines of code Build a complete air hockey game from scratch Learn best practices for tracking multiple screen touches Use animation loops and create collision functions Get the tools you need to build your own stunning game graphics Apply game physics to give your game a sense of realism Record and edit lifelike sound effects, and create your own background music Design a computer player with different levels of difficulty Featuring an introduction by Steve Wozniak Todd Moore founded TMSOFT to create unique smart phone applications and games. His most popular game title, Card Counter, was featured by Engadget, the Los Angeles Times, and CNET TV. Todd's most popular application, White Noise, was featured by iTunes, Health Magazine, The Washington Post, PC Magazine, and Late Night with Jimmy Fallon.

Tapestry 5: Building Web Applications

by Alexander Kolesnikov

This book is for those who want to build sophisticated Java web applications quickly and easily. It assumes that the reader is reasonably comfortable with the Java programming language, but no knowledge of web technologies is needed. For experienced Servlet, JSP, or Struts developers, the book will show an alternative way that will allow them to raise their productivity to an incomparable level. With this book you will see that a contemporary component-based framework can be easy to learn and a pleasure to work with.

Tapworthy: Designing Great iPhone Apps

by Josh Clark

So you've got an idea for an iPhone app -- along with everyone else on the planet. Set your app apart with elegant design, efficient usability, and a healthy dose of personality. This accessible, well-written guide shows you how to design exceptional user experiences for the iPhone and iPod Touch through practical principles and a rich collection of visual examples.Whether you're a designer, programmer, manager, or marketer, Tapworthy teaches you to "think iPhone" and helps you ask the right questions -- and get the right answers -- throughout the design process. You'll explore how considerations of design, psychology, culture, ergonomics, and usability combine to create a tapworthy app. Along the way, you'll get behind-the-scenes insights from the designers of apps like Facebook, USA Today, Twitterrific, and many others.Develop your ideas from initial concept to finished designBuild an effortless user experience that rewards every tapExplore the secrets of designing for touchDiscover how and why people really use iPhone appsLearn to use iPhone controls the Apple wayCreate your own personality-packed visuals

Target C#: Simple Hands-On Programming with Visual Studio 2022

by Gerard Byrne

So, you want to learn C# and Visual Studio 2022, but are a bit intimidated? Don’t be. Programming is within your grasp! Programmers at any level have to fully understand, and more importantly, be able to code the core constructs. It is impossible to use complex programming concepts such as classes before understanding what methods and variables and their data types are. Once there is a foundation built on the basics, then all other topics can fall in line.While it is a forgone conclusion that languages change with the introduction of new features, the core concepts do not. Even large enterprises do not always update to the latest versions of languages and frameworks; their "backbone" applications have been developed to work, regardless. More than ever, enterprises need developers who can master and apply the core programming concepts and then be "up-skilled" with newer language levels and features as they integrate into the company. This book builds from the ground up. You will begin with an introduction to programming, learning the foundational concepts needed to become a C# programmer. You will then put to practice a wide range of programming concepts, including data types, selection, iteration, arrays, methods, classes and objects, serialization, file handling, and string handling. You will learn enough to develop applications that emulate commercial application code. Once you’ve got the foundational concepts, get ready to dive into common programming routines, including linear search, binary search, bubble sort and insertion sort, and use C# to code them. Code example annotations supplement the learning and are designed to enhance learning while also explaining why the code does what it does. This book: Teaches core programming through well-explained and simple-to-follow instructionsReinforces programming skills through the use of coding examples that extend user learningsExplains theoretical programming concepts; applies them practically with code examples Introduces the latest Microsoft C# Integrated Development Environment (Visual Studio 2022)Enlists clear, precise, and easy-to-understand language to assist readers of all levels and experienceUses a mix of "theory" and practical information that is designed to be friendly and engaging Who This Book Is ForBeginners, those refreshing their C# skills, or those moving from another programming language. No skills or previous knowledge is required. Readers will need to download Visual Studio 2022 Community Edition as this is what the book code has been based on, but they could use other Integrated Development Environments.

Target in Control: Social Influence as Distributed Information Processing (SpringerBriefs in Complexity)

by Robin R. Vallacher Agnieszka Rychwalska Magdalena Roszczyńska-Kurasińska Karolina Ziembowicz Marta Kacprzyk-Murawska Andrzej K. Nowak Mikolaj Biesaga

This concise monograph introduces and examines social influence from the perspective of the so-called target, rather than from the source, thus providing for the first time a bidirectional account of this pervasive social phenomenon, further bridging simple micro-level dyadic interaction rules with macro-level properties of the (social) system. This integrative approach allows for advanced models of influence to be developed in both the social and natural sciences (e.g. social animals). In particular, when used to investigate emergent properties of social change, this approach shows that social transitions occur as “bubbles of new” in the “sea of old.” While in the traditional view influence is synonymous with achieving power and control over others, the present approach to social influence puts the emphasis on the target’s motives and strategies. Here, the target may actively seek out influence to help forge opinions and achieve guidance regarding courses of action. In this process, the target observes others, models their thought and behavior, and asks for information and opinions. In this broadened perspective, the processes of social influence enables those being influenced (the targets) to use the knowledge and processing capacity of influence sources to maximize their access to information, minimize their processing effort, while optimizing their own functioning and that of the social system in which they evolve. This short text addresses above all scientists interested in social influence in the fields of psychology, sociology, economy, marketing, and biology. However, also researchers interested in modeling social processes, especially opinion dynamics and social change, such as computer scientists, physicists and applied mathematicians will benefit from the insights provided.

Target Recognition and Tracking for Millimeter Wave Radar in Intelligent Transportation

by Lin Cao Zongmin Zhao Dongfeng Wang

This book starts with the introduction of the radar working system from a mathematical point of view. It shows the composition of transmitted signal and echo signal, and describes the principle of speed measurement and distance measurement for different radar systems. The book focuses on millimeter-wave radar technologies related to echo signal denoising, target identification, clustering, and target tracking and develops a workable plan for the information fusion idea between millimeter-wave radar and machine vision.This book breaks down the systematic processing flow of millimeter-wave radar echo signals one by one from the standpoint of intelligent transportation, concentrating on the introduction of principles and reinforced by a plethora of experimental instances. So that readers from all relevant professions may comprehend millimeter-wave radar's involvement throughout the complete system process.

Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again

by Brittany Kaiser

An “important and gripping” memoir by the woman who blew the whistle on Cambridge Analytica and the data industry’s unethical practices (The Washington Post).When Brittany Kaiser joined Cambridge Analytica—the UK-based political consulting firm funded by conservative billionaire and Donald Trump patron Robert Mercer—she was an idealistic young professional, a veteran of Barack Obama’s 2008 campaign with degrees in human rights law and international relations. Her goal was to utilize data for humanitarian purposes, most notably to prevent genocide and human rights abuses. But her experience inside Cambridge Analytica opened her eyes to the tremendous risks this unregulated industry poses to privacy and democracy. In this explosive memoir, she reveals the disturbing truth about the multi-billion-dollar data industry, revealing how companies are getting richer using our personal information and exposing how Cambridge Analytica exploited weaknesses in privacy laws to help elect Donald Trump in 2016.Targeted is Kaiser’s eyewitness chronicle of the dramatic and disturbing story of the rise and fall of Cambridge Analytica. She reveals how Facebook’s lax policies and lack of sufficient national laws allowed voters to be manipulated in both Britain and the US, where personal data was weaponized to spread fake news and racist messaging during the Brexit vote and the 2016 election. In the aftermath, as she became aware of the horrifying reality of what Cambridge Analytica had done, Kaiser made the difficult choice to expose the truth. Risking her career, relationships, and personal safety, she told authorities about the industry’s unethical practices, eventually testifying before Parliament about the company’s Brexit efforts and helping Special Counsel Robert Mueller’s investigation into Russian interference in the 2016 election, alongside at least ten other international investigations.Packed with never-before-publicly-told stories, Targeted goes inside the secretive meetings with Trump campaign personnel—and makes the case that legal oversight of the data industry is not only justifiable but essential to ensuring the long-term safety of our democracy.“Captivating and revelatory.” —Publishers Weekly (starred review)Includes photographs

Targeted: How Technology Is Revolutionizing Advertising and the Way Companies Reach Consumers

by Mike Smith

Far from the catchy television spots and sleek magazine spreads are the comparatively modest ads that pop up on websites and in Internet searches. But don't be fooled--online advertising is exploding. Growing at a compound annual rate near 20%, it is now the second-largest advertising channel in the United States. Part history, part guidebook, part prediction for the future, Targeted tells the story of the companies, individuals, and innovations driving this revolution. It takes readers behind the scenes--examining the growth of digital advertising, its enormous potential, and the technologies that are changing the game forever. Leading the way is real-time bidding, which offers advertisers unprecedented precision in targeting ads and measuring their effectiveness. From keyword micro-markets and ad serving systems to aggregated virtual audiences and new business models, Targeted is sweeping in scope and stripped of technical complexity. It is an essential resource for anyone interested in finding and connecting with customers in the vast and shifting Internet universe.

Targeted Advertising Technologies in the ICT Space

by Christian Schlee

In recent years, the field of information and communication technology has started to change dramatically. Carriers are threatened by high revenue losses requiring them to identify new revenue potentials beyond their core business. Targeted advertising can be one of these revenue opportunities. Christian Schlee provides a broad overview of the latest developments and trends in targeted advertising in the ICT space. The author focuses on the technological aspects of targeted advertising, but also covers business and legal aspects. He analyzes the most interesting use cases in the Web, IPTV, the mobile environment, and in converged scenarios and examines important technological key building blocks.

Targeted Cancer Therapy in Biomedical Engineering (Biological and Medical Physics, Biomedical Engineering)

by Rishabha Malviya Sonali Sundram

This book highlights the role of Biomedical Engineering (BME) used in diagnosis (e.g., body scanners) and treatment (radiation therapy and minimal access surgery in order to prevent various diseases). In recent years, an important progress has been made in the expansion of biomedical microdevices which has a major role in diagnosis and therapy of cancer. When fighting cancer, efficacy and speed are of the utmost importance. A recently developed microfluidic chip has enabled a breakthrough in testing the efficacy of specialized cancer drugs.Effective cancer-targeting therapies will require both passive and active targeting strategies and a thorough understanding of physiologic barriers to targeted drug delivery. Targeted cancer treatments in development and the new combinatorial approaches show promise for improving targeted anticancer drug delivery and improving treatment outcomes.This book discusses the advancements and innovations in the field of BME that improve the diagnosis and treatment of cancer. This book is focused on bioengineering approaches to improve targeted delivery for cancer therapeutics, which include particles, targeting moieties, and stimuli-responsive drug release mechanisms. This book is a useful resource for students, researchers, and professionals in BME and medicine.

Targeted Learning in Data Science: Causal Inference For Complex Longitudinal Studies (Springer Series in Statistics)

by Mark J. van der Laan Sherri Rose

This textbook for graduate students in statistics, data science, and public health deals with the practical challenges that come with big, complex, and dynamic data. It presents a scientific roadmap to translate real-world data science applications into formal statistical estimation problems by using the general template of targeted maximum likelihood estimators. These targeted machine learning algorithms estimate quantities of interest while still providing valid inference. Targeted learning methods within data science area critical component for solving scientific problems in the modern age. The techniques can answer complex questions including optimal rules for assigning treatment based on longitudinal data with time-dependent confounding, as well as other estimands in dependent data structures, such as networks. Included in Targeted Learning in Data Science are demonstrations with soft ware packages and real data sets that present a case that targeted learning is crucial for the next generation of statisticians and data scientists. Th is book is a sequel to the first textbook on machine learning for causal inference, Targeted Learning, published in 2011.Mark van der Laan, PhD, is Jiann-Ping Hsu/Karl E. Peace Professor of Biostatistics and Statistics at UC Berkeley. His research interests include statistical methods in genomics, survival analysis, censored data, machine learning, semiparametric models, causal inference, and targeted learning. Dr. van der Laan received the 2004 Mortimer Spiegelman Award, the 2005 Van Dantzig Award, the 2005 COPSS Snedecor Award, the 2005 COPSS Presidential Award, and has graduated over 40 PhD students in biostatistics and statistics.Sherri Rose, PhD, is Associate Professor of Health Care Policy (Biostatistics) at Harvard Medical School. Her work is centered on developing and integrating innovative statistical approaches to advance human health. Dr. Rose’s methodological research focuses on nonparametric machine learning for causal inference and prediction. She co-leads the Health Policy Data Science Lab and currently serves as an associate editor for the Journal of the American Statistical Association and Biostatistics.

Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings

by Glenn P. McGovern

Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and

Targeting Uplift: An Introduction to Net Scores

by René Michel Igor Schnakenburg Tobias von Martens

This book explores all relevant aspects of net scoring, also known as uplift modeling: a data mining approach used to analyze and predict the effects of a given treatment on a desired target variable for an individual observation. After discussing modern net score modeling methods, data preparation, and the assessment of uplift models, the book investigates software implementations and real-world scenarios. Focusing on the application of theoretical results and on practical issues of uplift modeling, it also includes a dedicated chapter on software solutions in SAS, R, Spectrum Miner, and KNIME, which compares the respective tools. This book also presents the applications of net scoring in various contexts, e.g. medical treatment, with a special emphasis on direct marketing and corresponding business cases. The target audience primarily includes data scientists, especially researchers and practitioners in predictive modeling and scoring, mainly, but not exclusively, in the marketing context.

Refine Search

Showing 55,776 through 55,800 of 60,888 results